首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 10 毫秒
1.
Multimedia Tools and Applications - The paper proposes a robust image encryption scheme based on chaotic system and elliptic curve over a finite field. The sender and receiver agree on an elliptic...  相似文献   

2.
Multimedia Tools and Applications - The security of digital images has been under much more attack recently. A novel image security based on a hybrid model of deoxyribonucleic acid (DNA),...  相似文献   

3.
This paper presents a novel collaboration scheme for secure cloud file sharing using blockchain and attribute-based encryption(ABE). Blockchain enables us to implement access control as a smart contract between data owner and users. Each data owner creates its own smart contract where in a data user can request to access a specific file by registering a transaction. In response transaction, the data owner sends the required credential to the user thereby enabling her/him to decrypt the intended file on the cloud storage. This scheme is decentralized, fault tolerant and secured against DoS attacks. The cipher-key, which is used for file encryption, is embedded into a set of coefficients of a polynomial so-called access polynomial. It is attached to the encrypted file on the cloud storage as a metadata. The data user can restore the cipher-key by means of the credential receiving in response transaction and access polynomial. The data owner uses ABE scheme in response transaction to impose her/him access policy to the file as well as preserving user anonymity. This scheme supports fast revocation of the user access by means of updating the access polynomial coefficients and without any communication overhead to non-revoked users. Through formal verification, we show that the scheme is secure in terms of secrecy of credential information and authentication of participants. Finally, the evaluation results show that our scheme is scalable with acceptable performance up to 20,000 users.  相似文献   

4.
Hu  Weitong  Wu  Ting  Chen  Yuanfang  Shen  Yanzhao  Yuan  Lifeng 《Multimedia Tools and Applications》2021,80(19):28731-28743

Recent research has made an effort to take 8b-bit value as a polynomial coefficient and use a random number as the maximum coefficient term in a Shamir’s polynomial, where b > 0. These can help improve computationl efficiency by reducing the sum of calculating polynomials, and avoid the case of the coefficient of xk??1 being zero. However, such research still has the issues of requiring much extra storage space, lossy secret image, shadow images with large size, and storing permutation key. To solve the above issues, in this paper, we propose a novel scheme which takes 8b-bit value as a polynomial coefficient, designs a bit-level method and runs under Galois Field GF(28b). Experimental results show that this scheme improves existing similar schemes on several aspects, such as less extra storage space and higher computational performance.

  相似文献   

5.
王聪丽  陈志斌  葛勇 《计算机应用》2015,35(8):2205-2209
为保证红外成像系统中红外图像的信息安全,克服采用传统图像加密时方法安全性不高、实时性差的缺陷,在分析红外图像比特为平面特征的基础上,提出了利用Lorenz混沌系统对红外图像进行加密的方案。在方案中,采用Lorenz混沌系统,针对红外图像比特位平面影响因子分布特征,只加密红外图像的最高四个比特位平面,一次性实现图像横、纵坐标和比特位平面加密,将图像加密层次由像素级扩展到比特级。和传统图像加密算法相比,该方案基于红外图像独特的位平面分布特征,加密速度快,性能好,能有效抵抗穷举攻击,具有良好的抗干扰性能和较高的置乱度。该方案可应用于安全级别要求高的红外监控系统中,提高系统安全性,有效防止黑客入侵。  相似文献   

6.
A new quantum image encryption scheme is suggested by using the iterative generalized Arnold transforms and the quantum image cycle shift operations. The times of the quantum image cycle shift operations are controlled by a hyper-chaotic sequence generated by a new 4D hyper-chaotic system. The image pixels are scrambled by the iterative generalized Arnold transform, and the values of the pixels are altered by the quantum image cycle shift operations. The four initial conditions of the new 4D hyper-chaotic system are exploited to control the two parameters, the iterative rounds of the generalized Arnold transform and the times of the quantum image cycle shift operations, respectively. Thus, the main keys of the proposed quantum image encryption scheme are the four initial conditions of the new 4D hyper-chaotic system and the key space is relatively large enough. Simulation results and theoretical analyses demonstrate that the proposed quantum image encryption scheme outperforms its classical counterparts apparently.  相似文献   

7.
马超  卢玉贞 《计算机应用》2008,28(10):2704-2706
针对线性反馈移位寄存器产生的序列周期小,不适用于大数据量信息加密的缺点和单纯的混沌序列在有限精度下易出现小周期的问题,将二者结合,提出一种基于混沌的反馈移位寄存器设计方法,并对这一方法下产生的序列进行了大量的数据试验。分析结果证明,该法产生的二值序列密码具有优良的密码学特性,很适合用于数据加密。  相似文献   

8.
In recent years, a variety of chaos-based digital image encryption algorithms have been suggested. Most of these algorithms implement permutations and diffusions at the pixel level by considering the pixel as the smallest (atomic) element of an image. In fact, a permutation at the bit level not only changes the position of the pixel but also alters its value. Here we propose an image cryptosystem employing the Arnold cat map for bit-level permutation and the logistic map for diffusion. Simulations have been carried out and analyzed in detail, demonstrating the superior security and high efficiency of our cryptosystem.  相似文献   

9.
10.
With a significant advance in ciphertext searchability, public-key encryption with keyword search (PEKS) guarantees both security and convenience for outsourced keyword search over ciphertexts. In this paper, we establish static index (SI) and dynamic index (DI) for PEKS to make search efficient and secure in the state of the art. Suppose there are u senders to generate n searchable ciphertexts for w keywords. The search complexity of PEKS always is O(n) for each query, even if the keyword has been searched for multiple times. It is obviously inefficient for massive searchable ciphertexts. Fortunately, SI and DI help PEKS lowering the burden respectively in two phases: if the queried keyword is the first time to be searched, apply SI to reduce the complexity from O(n) to O(uw); otherwise, apply DI to reduce the complexity from O(n) to O(w). Because DI is invalid for the first time search on any keyword, SI and DI are simultaneously applied with PEKS to complete our work as the secure hybrid indexed search (SHIS) scheme. Since uwn in practice, our SHIS scheme is significantly more efficient than PEKS as demonstrated by our analysis. In the end, we show the extension of SHIS to multi-receiver applications, which is absent for pure PEKS.  相似文献   

11.
Multimedia Tools and Applications - In this paper, a new medical image encryption system is proposed using a special nonlinear filter function based linear feedback shift register (LFSR). This...  相似文献   

12.
为了有效地保护视频信息,根据H.265/高效视频编码(HEVC)的特点,提出一种变换系数置乱和语法元素加密相结合的方案。针对变换单元(TU),利用Arnold变换对4×4大小的TU进行置乱,同时设计了一种移位加密器,根据TU的直流电(DC)系数近似分布规律对加密器进行初始化,并用Arnold变换生成加密映射对8×8、16×16、32×32大小TU的DC系数进行移位加密。针对熵编码过程中部分采用旁路编码的语法元素,利用Logistic混沌序列进行加密。加密后的视频峰值信噪比(PSNR)和结构相似性(SSIM)分别平均下降了26.1 dB和0.51,压缩率仅降低了1.126%,也仅带来0.170%的编码时间增长。实验结果表明,在保证较好的加密效果、对比特率影响较小的前提下,所提方案具有较小的额外编码开销,适用于实时视频应用。  相似文献   

13.
Multimedia Tools and Applications - Chaos based image encryption techniques are well accepted in research communities to perform permutation at pixel/bit level using pseudo-random sequence and...  相似文献   

14.
Multimedia Tools and Applications - Digital image communication over public networks requires a high level of security to protect picture elements that represent information. Security is an...  相似文献   

15.
Chaos-based image cryptosystems usually adopt the traditional confusion-diffusion architecture which is considered insecure against known/chosen plaintext attacks. To overcome this drawback, this paper proposes a novel chaos-based image encryption scheme, in which the two-dimensional rectangular transform is employed to directly scramble the image of any rectangular size, and the dependent substitution is introduced to substitute for each pixel according to the image pixels. This scheme comprises two stages of encryption processes. Each stage provides the confusion and diffusion simultaneously in one traverse of image pixels. As a result, the proposed scheme has high speed and achieves a satisfactory security performance. Experimental results and various types of security analysis indicate that this scheme is efficient and secure enough to be used for practical image encryption and transmission.  相似文献   

16.
根据选择明文攻击原理,对一种超混沌图像加密算法进行了分析,结果表明该算法不能抵抗选择明文攻击。提出了一种改进的超混沌图像加密算法;对改进算法进行了安全性分析和实验测试。理论分析及实验结果表明,改进算法克服了原算法不能抵御选择明文攻击的缺陷,而且能拥有更好的统计特性、差分特性等密码学特性和更高的加密速度。  相似文献   

17.
Liang  Xikun  Tan  Xiao  Tao  Limin 《Multimedia Tools and Applications》2020,79(3-4):2719-2743
Multimedia Tools and Applications - In this paper, a plaintext related image hybrid encryption scheme is proposed based on Lagrange interpolation, generalized Henon map and nonlinear operations of...  相似文献   

18.
Multimedia Tools and Applications - Due to the availability and increased usage of multimedia applications, features such as compression and security has gained more importance. Here, we propose a...  相似文献   

19.
Jahangir  Saria  Shah  Tariq 《Multimedia Tools and Applications》2020,79(37-38):26885-26911
Multimedia Tools and Applications - In this article, we have developed an encryption technique to encrypt any kind of digital information. The main work is to construct the component of the block...  相似文献   

20.
一种基于混合反馈的混沌图像加密算法   总被引:5,自引:0,他引:5  
针对现有基于混沌分组密码的图像加密算法中,扩散函数扩散速度慢、需要多轮迭代才能抵抗差分攻击的缺点,提出了一种新的基于密文和输出混合反馈的混沌图像加密算法。该算法利用密文扰动混沌系统的初始值,既改善了数字混沌的退化,又能使扩散函数具有非常快的扩散速度。经过实验验证,该算法只需正反两轮迭代,就能达到较高的安全性和较快的加解密速度。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号